Rozšírené hľadanie
Štvrtok 26. December 2024 |
meniny má Štefan
Debian: DSA-5835-1: webkit2gtk Security Advisory Updates

26.12.2024 10:15 The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2024-54479

Fedora 41: sympa 2024-88ad2bee84 Security Advisory Updates

26.12.2024 10:15 Update to 6.2.74, fix for CVE-2024-55919 Full changelog: https://github.com/sympa-community/sympa/releases/tag/6.2.74

Fedora 40: tomcat 2024-2a31fce8eb Security Advisory Updates

25.12.2024 14:15 Automatic update for tomcat-9.0.98-1.fc40. Changelog for tomcat * Mon Dec 09 2024 Packit - 1:9.0.98-1 - Update to version 9.0.98 - Resolves: rhbz#2331168

Fedora 40: sympa 2024-14c006b8bb Security Advisory Updates

25.12.2024 14:15 Update to 6.2.74, fix for CVE-2024-55919 Full changelog: https://github.com/sympa-community/sympa/releases/tag/6.2.74

Fedora 41: tomcat 2024-2cb3145f8d Security Advisory Updates

25.12.2024 14:15 Automatic update for tomcat-9.0.98-1.fc41. Changelog for tomcat * Mon Dec 09 2024 Packit - 1:9.0.98-1 - Update to version 9.0.98 - Resolves: rhbz#2331168

openSUSE: 2024:4416-1 moderate: vhostmd Advisory Security Update

25.12.2024 03:45 

SUSE: 2024:4416-1 moderate: vhostmd Security Advisory Updates

25.12.2024 03:45 * bsc#1129772 * bsc#1152803 * bsc#1154838 * bsc#1181400 * bsc#1230961

openSUSE: 2024:4422-1 moderate: poppler Advisory Security Update

25.12.2024 03:45 

SUSE: 2024:4422-1 moderate: poppler Security Advisory Updates

25.12.2024 03:45 * bsc#1234795 Cross-References: * CVE-2024-56378

openSUSE: 2024:4421-1 moderate: poppler Advisory Security Update

25.12.2024 03:45 

SUSE: 2024:4421-1 moderate: poppler Security Advisory Updates

25.12.2024 03:45 * bsc#1234795 Cross-References: * CVE-2024-56378

Fedora 40: python3.12 2024-82a696ca59 Security Advisory Updates

24.12.2024 17:00 Update to 3.12.8

Fedora 40: python3-docs 2024-82a696ca59 Security Advisory Updates

24.12.2024 17:00 Update to 3.12.8

Mageia 2024-0397: emacs Security Advisory Updates

24.12.2024 17:00 In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte

SUSE: 2024:4413-1 moderate: gdb Security Advisory Updates

24.12.2024 07:15 * bsc#1220490 * jsc#PED-10258 * jsc#PED-10751 Cross-References:

Následujúci mesiac